summaryrefslogtreecommitdiff
path: root/src/lib/libssl (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Assorted cleanups:miod2014-05-061-14/+4
| | | | | | | | | | | - replace hardcoded sizes with sizeof() - pqueue_find() apparently used to need to keep track of the previous node when iterating, which causes its logic to be complicated. However, nowadays it only needs to iterate, so replace with a straightforward, much readable logic. - remove #if 0'ed code From ``sin'' from 2f30 dot org on tech@, thanks!
* Remove broken-by-design testmiod2014-05-061-95/+0
|
* Make sure PKCS7_get_octet_string() return values are checked for NULL.miod2014-05-061-2/+10
| | | | | | Reported by David Ramos (and simultaneously to OpenSSL as PR#3339). ok beck@ logan@
* knf approximationtedu2014-05-0624-8619/+9136
|
* "stay backwards-compatible with 0.9.5; this should go away soon"tedu2014-05-061-8/+0
| | | | it's your lucky day!
* remove Kerberostedu2014-05-062-41/+0
|
* move a comment to make unifdef happiertedu2014-05-061-2/+3
|
* bye bye SRPtedu2014-05-064-975/+0
|
* inspired by a cloudflare diff, cleanse old memory when expanding a bignum.tedu2014-05-051-17/+9
| | | | | | however, instead of trying to audit all the places where a secret bignum is used, apply the big hammer and clear all bignums when freed. ok deraadt miod
* Sort and group includes.jsing2014-05-052-10/+11
|
* Repair BIO_socket_nbio operation.jsing2014-05-051-2/+3
| | | | ok miod@
* During the great e_os.h nukathon we stopped pulling in <sys/filio.h> viajsing2014-05-053-35/+6
| | | | | | | | | the ifdef maze, meaning that FIONBIO was no longer defined. This removes non-blocking I/O support from s_{client,server,time}. Remove all FIONBIO ifdefs and import <sys/ioctl.h>, renabling -nbio. ok miod@
* Kill memory debug calls that are now noops. While here, nuke an #if 0 andjsing2014-05-051-22/+3
| | | | | | a unnecessary NULL check before free. ok miod@
* OpenBSD has_SC_CLK_TCK.jsing2014-05-051-27/+0
| | | | ok miod@
* Remove SRP and Kerberos support from libssl. These are complex protocolstedu2014-05-0530-5120/+2
| | | | | all on their own and we can't effectively maintain them without using them, which we don't. If the need arises, the code can be resurrected.
* Improve line wrapping for lines exceeding 80 chars.jim2014-05-0482-305/+430
| | | | ok jmc@
* Add missing SEE ALSO section header.jim2014-05-041-0/+2
| | | | yup jmc@
* Remove trailing whitespace.jim2014-05-0485-202/+202
| | | | fine jmc@
* Remove a leading whitespace.jim2014-05-041-1/+1
| | | | ok jmc@
* Add missing SEE ALSO section header.jim2014-05-042-0/+4
| | | | ok jmc@
* Improve line wrapping for lines exceeding 80 chars.jim2014-05-0443-58/+115
| | | | ok jmc@
* Remove trailing whitespace.jim2014-05-0422-36/+36
| | | | ok jmc@
* Remove trailing whitespace.jim2014-05-0437-176/+176
| | | | no objection jmc@
* i give up. reuse problem is unfixable. dlg says puppet crashes.tedu2014-05-041-8/+4
|
* Do not compile the neon probe code until __ARM_ARCH__ >= 7. Neon-specific codemiod2014-05-032-2/+14
| | | | will not get referenced if this condition is not met.
* typosmiod2014-05-031-2/+2
|
* Add checks for invalid base64 encoded data, specifically relating to thejsing2014-05-031-0/+12
| | | | | | | | | | | | | | | | | | | | | handling of padding. This fixes a crash that can be triggered by feeding base64 data followed by 64 or more padding characters, which results in a negative output length. This issue was reported by David Ramos, although the same bug has been sitting in the OpenSSL RT since 2011: https://rt.openssl.org/Ticket/Display.html?id=2608 Worse still, BIO_read seems to be completely unable to detect that the base64 input was invalid/corrupt - in particular, enabling BIO_FLAGS_BASE64_NO_NL results in a stream of zero value bytes rather than no input (possibly a good replacement for /dev/null...), which could result in nasty consequences. Prior to this fix some zero value bytes were also injected without this flag being enabled. The recently added base64 regress triggers and documents these issues (and also ensures that this change retains functional behaviour).
* It is definitly not the correct spelling.jsing2014-05-031-2/+2
|
* KNF.jsing2014-05-034-932/+910
|
* Nuke more defines - we have setvbuf() and _IONBF.jsing2014-05-032-16/+0
| | | | ok deraadt@
* KNF.jsing2014-05-034-495/+514
|
* Detect Altivec support with the machdep.altivec sysctl rather than setmp andmiod2014-05-032-102/+20
| | | | | a SIGILL handler. Do not attempt to detect and use a 64-bit FPU yet.
* More use of 64-bit registers which needs to be disabled under OpenBSD.miod2014-05-022-0/+4
|
* The assembly sha512 code detects at runtime if it is running on a 64-bitmiod2014-05-021-0/+6
| | | | | | | | | | | | processor (PA2.0) and, if so, switches to 64-bit code. However, when running under a 32-bit OpenBSD/hppa kernel, there is no guarantee that the upper part of the registers will be preserved accross context switches (or even userland->kernel boundaries), which causes this code to fail. Wrap the generated code within #ifndef __OpenBSD__ in that case, to avoid using the 64-bit code completely. (OpenBSD/hppa64, once stable, will not be affected by this)
* Add ChaCha as a cipher.jsing2014-05-021-0/+3
| | | | ok beck@ miod@
* remove crazy #undefs; ok jsingderaadt2014-05-0210-13/+0
|
* Nuke OPENSSL_NO_SOCK since any half sane operating system has sockets.jsing2014-05-029-35/+0
| | | | ok beck@
* Sort and group includes. We also do not need to include openssl/evp.h morejsing2014-05-021-45/+47
| | | | | | than once. ok beck@
* Sort function prototypes and group/sort entries within the functions array.jsing2014-05-021-237/+125
| | | | ok beck@
* Do not output SOM-specific directives.miod2014-05-017-0/+40
|
* Remove unreferenced OPENSSL_instrument_bus and OPENSSL_instrument_bus2 routines.miod2014-05-012-105/+0
|
* Make the implicit `l' in `impicit' explicit.miod2014-05-011-1/+1
|
* Fix include filename to get register name aliases under BSDmiod2014-05-013-18/+3
|
* Pass -Werror in the !BN_LLONG !BN_UMULT_LOHI !BN_UMULT_HIGH case.miod2014-05-011-4/+4
|
* dead meatmiod2014-05-012-2528/+0
|
* Update with recently added objects.jsing2014-05-011-0/+18
| | | | ok miod@
* Nuke unused evptests.txt - the real one is over in regress.jsing2014-05-011-334/+0
| | | | ok miod@
* Provide an EVP implementation for ChaCha.jsing2014-05-016-0/+108
| | | | ok miod@
* Add ChaCha to libcrypto, based on djb's public domain implementation.jsing2014-05-013-0/+314
| | | | ok deraadt@
* Add support for the french ANSSI FRP256v1 elliptic curve.miod2014-05-012-1/+35
| | | | | | | | | | While not to be considered a good choice of elliptic curve (refer to http://safecurves.cr.yp.to/ for more details), it is nevertheless deemed a good decision to allow developers with requirements to use such a curve, to be able to do this via a crypto library allowing for much better choices to be made, without having to change (much of) their code to get better crypto. ok beck@ deraadt@